SIMANGA RADEBE – Specialist – IT Security Analysis, ABSA Group
NETWORK ASSURANCE
Network assurance, is the method of validating whether services and policies configured on and across network appliances appropriately align with operational goals. Network configuration and telemetry data are collected and analyzed to assess network behavior and detect and recommend deviations from the operator’s original intent.
Network assurance helps to verify that configurations and running network services align with what the business requires as closely as possible. The result of this procedure is suggestions on how network equipment can be better configured.
The overall reason for network assurance is to ensure networks are running as optimally and securely as possible within specific business parameters. Failing to do so can result in situations where applications and services operating across the network fail to meet performance, network security, and usability expectations.
THULANI MABUZA – Cybersecurity Consultant: Team Lead | Head, Orange Cyberdefense
GUARDIANS OF PRIVACY: NAVIGATING THE TERRAIN OF DATA PROTECTION AGAINST INSIDER THREATS
This topic will delve into the dynamic realm of data protection and privacy. As the guardians of privacy, we’ll navigate the challenging terrain of safeguarding sensitive information against the ever-evolving landscape of insider threats. Explore strategies, real-world scenarios, and best practices to fortify your defenses and ensure the integrity of data in an age where privacy is paramount. This will be an opportunity to enhance understanding of insider threats and emerge as a vigilant guardian of privacy in the digital era.
OLUWASEYI AKILUDE – Cybersecurity Engineer, Dimension Data
PROTECTING AGAINST CYBER ATTACK WITH VULNERABILITY MANAGEMENT
In today’s digital world, cyberattacks are a constant threat to businesses and organizations of all sizes. Hackers are constantly evolving their tactics, exploiting vulnerabilities in systems and software to gain access to sensitive data and disrupt operations. To stay ahead of these threats, it’s crucial to implement a robust vulnerability management program.
WAYNE THERON – Manager Information Security, BankservAfrica
REGULATORY COMPLIANCE IN CYBERSECURITY
Practical steps to ensuring legislative and regulatory compliance and embedding the practices as business-as-usual in your organisation
- Legislative and Regulatory Landscape in RSA
- Cybersecurity Threats to Compliance
- Understanding your Business and its Compliance Regime
- Developing a Roadmap for the Implementation of the ICT Regulatory Framework
- Controls Selection – Statement of Applicability
- Criticality Assessment and Harm Reference Table
- Compliance Matrix in Policies, Standards and Procedures
- Compliance Certifications ( ISO 27001, PCI Data Security Standard, PCI Three Domain Security Standards (PCI 3DS), SWIFT Customer Security Controls Framework, SWIFT Provider Security Controls Framework )
JEROEN KROON – Cybersecurity & Privacy advisor, SAP
DATA PRIVACY FROM A CSP PERSPECTIVE
SAP as one of the most important business cloud service providers in the world is dealing daily with data privacy. Not only in South Africa where the Popi act is active, but anywhere (Europe, USA, etc…) with local or regional privacy laws applies such as GDPR.
SITHEMBILE SHEZI – Cyber Security Manager; EY
IDENTITY AND ACCESS MANAGEMENT
This topic focuses on how CISO and Company Executives can partnership in defending organization. The CISO needs Senior Executive buy in, in executing the Cybersecurity Program and required investments.
NGOIE WANDELEWE – Manager – Senior Information Security Architecture, MTN GROUP
INTEGRATING SECURITY ARCHITECTURE IN DIGITAL TRANSFORMATION
In the rapidly evolving digital landscape, enterprises are continuously seeking ways to modernize and transform their operations to stay competitive and agile. This journey of digital transformation involves adopting new technologies, processes, and business models. However, this transformation also introduces significant security challenges as the traditional boundaries of enterprise networks dissolve and the attack surface expands.
This talk delves into the critical role of security architecture in digital transformation. We will explore how an integrated, well-designed security architecture is essential to safeguard digital initiatives and ensure resilience against cyber threats.